A vulnerability that allows an attacker to run a code or module that exploits a vulnerability
Arbitrary Code Execution
A type of arbitrary code execution that allows an attacker to transmit code from a remote host
Remote Code Execution
Occurs when a user accesses or modifies specific resources that they are not entitled to normally access
Privilege Escalation
A class of malware that modifies system files, often at the kernel level, to conceal its presence.
Rootkit
Type of network-based attack that involves maliciously repeating or delaying valid data transactions
Replay Attack
Attacker alters real-time data transmissions
Session Hijack
Unique data pieces that prevent session replay by attackers
Session Tokens
A fundamental security component that enables web applications to identity a user
Session Management
Allow web applications to retain information about the users
Cookies
A type of spoofing attack where the host is disconnected and replaced by the attackers
Session Hijacking
An attacker attempts to predict the session token to hijack that session.
Session Prediction
Modifying the contents of a cookie to be sent a client’s browser and exploit the vulnerabilities in an application
Cookie Poisoning
An attack where the penetration tester put the workstation logically between two hosts during the communication
On-path Attack
Occurs when an attacker captures a valid data, which is then repeated immediately or delayed and then repeated
Replay
Occurs when attackers insert themselves in between two hosts and become part of the conversation
Relay
Tricking the encryption application with an HTTP connection instead of an HTTPS connection
SSL Stripping
Occurs when an attacker attempts to have a client or server abandon its higher security mode
Downgrade Attack
A protocol for access and maintenance of distributed directory information services
LDAP
An attack in which LDAP statements, typically created by user input, are fabricated.
LDAP Injection
A threat actor is able to execute arbitrary shell commands via a vulnerable web application
Command Injection
A method of executing arbitrary code in the address space of a separate live process
Process Injection
Data pieces that detect potential malicious activity on a network or system
IoC
Signals a compromise when it’s triggered by numerous failed login attempts.
Account Lockout
One user having multiple active session
Concurrent Session Usage